10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Acknowledgments<br />

First <strong>and</strong> foremost, I would like to thank my wife <strong>and</strong> children for allowing me to take<br />

the time to write this book, also known as Daddy’s second dissertation. This book<br />

would never have happened <strong>with</strong>out their support.<br />

Many thanks to my friend <strong>and</strong> technical editor, Vivek Ramach<strong>and</strong>ran, for his<br />

advice on all things infosec <strong>and</strong> on writing a book. I am eternally grateful that he<br />

agreed to be the technical editor for this book despite his busy schedule.<br />

Thanks to my fellow authors T.J. O’Connor <strong>and</strong> Jayson Street for offering advice<br />

<strong>and</strong> encouragement when I was contemplating writing this book.<br />

Finally, I would like to thank organizers of quality security conferences for providing<br />

a forum to share my little slice of infosec <strong>with</strong> others. In particular, I wish to<br />

thank Steve Lord <strong>and</strong> Adrian from 44CON <strong>and</strong> Chris <strong>and</strong> Jaime Payne from GrrCON<br />

for initially taking a risk accepting an unknown speaker <strong>and</strong> later allowing me the<br />

privilege of speaking at their conferences multiple times.<br />

xv

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!